Wednesday, December 25, 2019

Linux Securities - 1119 Words

Security of a system when you are open to the internet is paramount in the world of servers. Linux has many layers of ever evolving security in order to keep up with the would be attackers in cyberspace. This is one of the reasons that Linux is one of the most used servers for internet sites and has few viruses engineered towards it. IP Tables Developed by the Netfilter organization the IP tables package for Linux is an evolution of the IP chains which came from the IPv4 Linux firewall package. Paul Russel was the initial head author of the organization and also behind the IP chains project The Netfilter organization began to come together in 1999 and through collaboration and research recognized the shortcomings of the IP chains†¦show more content†¦Traditionally Linux security has been run using DAC ( Discretionary Access Control ), which is based on users and groups to control which users and processes can access files and how they do it. This runs into a problem since the owner of a file has control over its permissions which can be less than ideal. SELinux ( Security-Enhanced Linux ) implements MAC ( Mandatory Access Control ), which is under the direct control of the systems administrator and is located in the kernel where it can control and enforce security, giving only the permissions needed to processes and users. In the way of vulnerabilities I could not find much for SELinux, which is a testament to the power of MAC. As secure as it may be, for most home users this system is a bit complicated and can block services and make it look like a common error, making troubleshooting problematic. I would still recommend using a firewall in conjunction with SELinux as security is best utilized when it is layered in order to make attacks more difficult. Linux has a rich history of collaborations between different organizations and input from users worldwide. This has led to a world class piece of open source software that has proven itself to have both the reliability and security to provide the peace of mind for users and corporations worldwide to use for day to day operations andShow MoreRelatedLinux Security1588 Words   |  7 Pagessingle sub-tree of the file system.† â€Å"In order for it to work properly, some common programs and libraries need to be copied or linked to the appropriate locations in the new directory tree.† (Haas) The term sandbox is a metaphor for the type of security that chroot jail uses. Once you put a program or utility into the jail, it only knows of what is contained in the cell, the rest of your system becomes invisible to it. It does this by changing the apparent root directory for the current runningRead MoreLinux Security985 Words   |  4 PagesRobert Hoffman Linux Research 2.1 Security for computers is one of the most important aspects of a system that has to be in place. For this paper I will be writing about four security features that Linux systems use; these are SELinux, chroot jail, openSSH, and iptables. I will briefly describe what they do to provide security. SELinux (security enhanced Linux) was developed by the NSA, who chose Linux as its operating system to create a more secure operating system. SinceRead MoreLinux Security Technology1868 Words   |  8 Pages|Linux Security Technology | | 1. SELinux SELinux, an implementation of  Mandatory Access Control  (MAC) in the Linux kernel, adds the ability to administratively define policies on all subjects (processes) and objects (devices, files, and signaled processes). This mechanism is in the Linux kernel, checking for allowed operations after standard Linux Discretionary Access Controls DAC are checkedRead More4-20-2014 Protection and Security mechanisms in Linux and Windows Intro to Operating2800 Words   |  12 Pages4-20-2014 Protection and Security mechanisms in Linux and Windows Intro to Operating Systems Stuart Gourlay (12382696) Rory O’Reilly (12370056) â€Æ' Table of Contents Windows 2 Overview of Windows 8 2 New Features 2 System Requirements 2 Security Mechanisms in Windows 8 3 Address Space Layout Randomization 3 Heap Randomization 3 Kernel Mode Security 3 UEFI Secure Boot 4 Windows Defender 4 Linux 5 How Linux is Broken Down 5 OverviewRead MoreEssay about Security Enhanced Linux (Selinux), Chroot Jail, and Iptables682 Words   |  3 PagesSecurity Enhanced Linux (Selinux), Chroot Jail, and Iptables Security Enhanced Linux (Selinux), Chroot Jail, and Iptables Three of the most important types of Linux security technologies are Security Enhanced Linux (SELinux), chroot jail, and iptables. This security measures aide in the subversion of theft and malicious activity. We will discuss these items in depth to address who created them and for what reason. Along with how these technologies changed the operating system to enforce securityRead MoreLinux Security3394 Words   |  14 PagesSecuring Linux Platforms and Applications Project Project Part 1 Task 1: Outline Security Policy This security policy is essential to the First World Bank Savings and Loan. It is used to break up the security plan not measurable, specific, and testable goals and objectives. This security policy would be used to provide all current and prospective customers online banking services while keeping the First World Saing bank competitive in the financial marketplace. This solution is also an imperativeRead MoreRed Hat Enterprise Linux 6 Security Guide50668 Words   |  203 PagesRed Hat Enterprise Linux 6 Security Guide 1 Red Hat Enterprise Linux 6 Security Guide A Guide to Securing Red Hat Enterprise Linux Edition 3 Red Hat Engineering Content Services 2 Legal Notice Legal Notice Copyright  © 2011 Red Hat, Inc. Based on the Fedora Security Guide (current version at http://docs.fedoraproject.org/enUS/Fedora/16/html/Security_Guide/index.html), written by Johnray Fuller, Eric Christensen, Adam Ligas, and other Fedora Project contributors. T he textRead MoreThe Linux Security Checklist From Sans2024 Words   |  9 Pagesinto the system. The Linux Security Checklist from SANS has basic step by step guidance one can follow in securing an OS (Homsher Evans, n.d.). 5.1. Never run Jenkins with root/administrator privileges One should never run with administrator or root privileges regardless of the operating system platform. If a hacker manages to get in, he or she will still need to find ways to perform privilege escalation to cause more harm. Hopefully, this buys enough time for security professionals within theRead MoreMajor Elements Of Memory Management1648 Words   |  7 PagesD. Major elements of memory management Linux operating system is using virtual memory to support programs running in the system. The virtual memory provides lots of optimal ways to maximize the memory mapping and utilization. The virtual memory can allocate much more memory to processes than its actual physical memory size. Linux provides virtual memory great support to allow the processes running in the system, such as mapping the process’s memory to physical memory (Arora, 2012). There are twoRead MoreFirst World Bank Savings And Loan1149 Words   |  5 PagesFirst World Bank Savings and Loan Mission: First World Bank Savings and Loan strives to become the leader in the competitive financial institution market by applying new and updated security policies to their advanced Linux based server applications. Company Background: First World Bank Savings and Loan is a financial institution in the United States, a leading financial service firm that estimates over $100,000,000 a year in online credit card transactions for loan applications and other banking

Monday, December 16, 2019

Math Research Paper - 1452 Words

Math Research Paper Since the 1980’s calculator use in the classroom has been a huge controversy between educators (Golden, 2000). It is becoming increasingly common to use calculators in the classroom on a regular basis. Some states allow students to use calculators on standardized tests and as part of the regular curriculum (Dion, 2001). Because we live in such a technologically changing world, hand held calculators have been far surpassed and can be purchased for as low as $4.00 each. This low price however, has not swayed the many people that believe calculators are not appropriate in the classroom. These critics argue that calculators take away student’s basic knowledge of mathematics, prevent children from truly†¦show more content†¦This evidence alone is enough proof, for some, that calculator use takes away basic skills and when given a test where these skills come into play, children do not perform well. It is believed that the difference in calculator use based on race and wealth may reinforce inequality in scholastic achievement, rather than narrow them (Golden, 2000). Because calculators are so cheap, in comparison with computers, most schools can afford to provide them for each student, therefore, this is the only technology readily available to low-income schools and calculators are often overused (Golden, 2000). In addition, another concern with calculators is that many children feel they are cheating, taking the easy way out, or taking and illegal shortcut by using a calculator. They think they are skipping out on the work and by doing so are bein g immoral (Dresdeck, 1999). On the contrary, advocates of calculator use in the classroom claim that calculators allow students to spend less time on tedious calculations and more time on understanding and solving problems, help students develop better number sense, allow students to study math concepts that they could otherwise not have time to perform without calculators, allow students who are normally turned off to math increaseShow MoreRelatedFactors Influencing the Transition to University Service Mathematics: Part 21804 Words   |  7 Pagesï » ¿Research Study Examination Summary of the Paper The paper entitled, Factors influencing the transition to university service mathematics: part 2 a qualitative study by Liston and ODonoghue (2010), seeks to shed light on the fact that so many university students enter the higher education setting with inadequate skills for excelling in mathematics. In this case, Liston and ODonoghue focused on the fact that this deficiency thus meant that it would be not only a struggle for students at thisRead MoreAnalysis of Differnt Types of Learning Methods1365 Words   |  6 Pagesto build a solid foundation for their mathematic skill and succeed in their future academic school years. Analysis of Learning Methods Cover, Copy and Compare (CCC) is a learning method that requires students to look at a correct example such as a math statement and its answer. Then, students cover the example and jot down the example and its answer. Lastly, students check their answer with the example; if the students answer the example correctly such as matches the example’s answer, the studentRead MoreThe Effect Of Fine Arts On Standardized Tests Scores993 Words   |  4 PagesOne of the largest issues with fine arts implementation is the narrow effects. Garcia et. al conducted research that attempted to determine the effect fine arts have on standardized test scores. The researchers found that specific students attending schools with dense fine arts programs scored higher on the state standardized test; however, this improvement does not imply that fine arts will effectively cure the education decline. When analyzing the results, one sees that the fine arts mainlyRead MoreThe Issues Within Public Ed ucation Essay1393 Words   |  6 Pagesthat are science and math driven. This then leads into the fact that women make less money than men, so something must be unequal, whether it is education or gender rights, or both. This paper will examine the gender gap in K-12 education, which includes stereotyping and the unequal representation of boys in math and science classes. Since the early 2000s there has been a push for girls to join the Science, Technology, Engineering and Math (STEM) fields, therefore, this paper assesses how that mightRead MoreComputers And The Classroom : A Help Or A Crush1514 Words   |  7 PagesCalculators in the Classroom: A Help or a Crush This research topic will discuss whether students use or abuse calculators in the classroom. There are a number of reasons for discussing this topic. Mainly, the concern over students using calculators has proven to be an extremely split and controversial subject for professional educators, parents and other such special interests groups for several years. Since the first hand-held electronic calculators appeared on the market nearly 30 years agoRead MoreImproving Second Graders Communication Of Mathematical Thinking976 Words   |  4 PagesIntroduction The article analyzed in this paper is the mixed research study titled Using Math Journals to Enhance Second Graders’ Communication of Mathematical Thinking. The quality of the research problem stated in the article was well put together. The researcher stated the problem clearly and identified why it was a problem. The gap in the literature the study is attempting to fill is communication of mathematical thinking. Often time’s students cannot intellectually explain how they got toRead MoreA Critique Of Research Conducted By Kathleen Kostos And Eui Kyung Shin1553 Words   |  7 PagesIntroduction This paper is a critique of research conducted by Kathleen Kostos and Eui-kyung Shin. The research article describing this research project is titled: Using Math Journals to Enhance Second Graders’ Communication of Mathematical Thinking (Kostos, 2010). In this study, math journals were used in Ms. Kostos’s second grade classroom to determine if their use would increase the student’s abilities to communicate their mathematical thinking. Research Problem Ms. Kostos is a second gradeRead MoreA Summary On The Intellectual Merits And. Broader Impact Of The Project1110 Words   |  5 Pagesintroduced in conjunction with the Blaschke- Santal inequality from the convex and affine geometry to tackle the long standing convergence problem of the Gauss curvature flow in dimension greater than two. (In dimension two this was done in a celebrated paper of Andrews in 1999). The method also can be generalized to the flow by the power of the Gauss curvature. The required regularity results have been proved via the new entropy quantities. The smooth convergence to a soliton was successfully establishedRead MoreGraduation Speech : School, Middle School And High School870 Words   |  4 Pagesthey offer the same basic history, math, English, science, and social science course. By the time high school comes around students have already learned the same things again but only this time it is harder and more in depth. College becomes a time that a student really begins to learn about what they want to do with the rest of their lives. When applying to college, applicants don’t apply to learn math, English, history, and science. They apply to learn just math, English, Art, Business, BiologyRead MoreUsing Internet Sites With Sixth Graders1653 Words   |  7 PagesGraders My idea for having my seventh graders do a research project came from the session of my Walsh University class in which we were given the assignment of researching information on anything we were interested in with our electronic devices. This sparked an idea: How much more interested could my students be, than being given the opportunity to select their own topic to research? I knew I would be able to let them do their research at school on chromebooks, as we are fortunate enough in

Sunday, December 8, 2019

Auditing & Assurance Risk Assessment

Question: Discuss about the Auditing Assurance Risk Assessment. Answer Introduction This report will emphasize on the issues of speculation of inherent risk for the upcoming audit assignment of audit firm EA Partners. It is the basic homework for the audit firm to assess the risk factors related to new audit assignment to safeguard the same while executing audit operation. There are three different types of probable risks normally found in the audit practice- inherent risk, control risk and detection risk(Nguyen, 2009). These are all different in nature but mainly focused with the material misstatement of financial information and its subsequent impact on the financial report of the identity. In this present report we will focus on inherent risk of a company of Australian base named David Jones Corporation who is engaged in the business of retailing of garments and other products. Being a senior partner of the audit firm, EA Partners, I was assigned to detect inherent risk related to the upcoming assignment of David Jones Corporation. For this purpose I will utilize my experience of working in the retail chain outlet as accountant to find the inherent risks normally relevant to this type of business as per guideline fixed by Australian Audit Standards governed by Auditing and Assurance Standard Board of Australia. David Jones Corporation- The Client The company, David Jones Corporation popularly known as DJs, was established in 1838 by David Jones. The main business of this brand is to spread the departmental stores in Australia and abroad. The company has its nearby competitor in the name of Myer. The company is recently acquired by the world famed Woolworths Ltd, a South African Retail group under the umbrella of Woolworths Holdings Limited since midway of 2014. The acquisition process had been endorsed by the DJs management with the effective capitalization of $ 2.15 billion. The acquisition had been approved by the Federal Court of Australia in July 2014. The company has human resource strength of 4956 in 2016 in comparison to 4175 in 2015 as per data retrieved from the financial report of Woolworths Holdings Limited for the year 2016. Auditing Standard ASA 315 The above Auditing Standard is meant for detection of risk of audit assignment for material misstatement in the financial report of any company. ASA 315 is complying with the International Auditing Standards IAS 315 to ensure the global acclaimed policy related to the subject. This standard is enforced with the objective of identifying and assessing respective risks of material misstatement in the financial reports due to reasons of frauds or mistakes, whether intentional or unintentional(Auasb, 2006). This objective is endorsed with the conception of the establishment in respect of environment with the internal control which can provide the basis of implementation and design of responses related to the risks assessed occurred due to material misstatement. To ensure this activity, proper analytical verification of financial statement of the entity is to be done in respect of different financial information provided upon which the foundation of the financial report is being made(Auasb , 2013). Inherent Risks David Jones Corporation Being a senior audit partner, it is my duty to find different areas of financial operation which can generate inherent risks related to financial operation of the company. Through the annual financial report of Woolworths Holdings Limited, it is observed that the group is performing with systematic way of handling its financial activities and the same is being scanned through the effective Audit Committee which is already fixed its basic compliance criteria with the execution of the financial operations of the companies under the group. It had been observed from the report of the Audit Committee that David Jones had executed compliance level to ensure the mandate of compliance set by the Audit Committee of the Group(Investopedia, 2016). Even after the certification by the Audit Committee, it is my professional obligation to find inherent risk in different areas in which there may be occurrence of such risks during the concluded financial report. In this aspect I have highlighted certain specific areas which are given below with my observations:- Goodwill As David Jones had been taken over by Woolworths Holding Limited, evaluation of goodwill is significant in the acquisition process. As goodwill is falling under the category of long term assets under the subhead of intangible assets, evaluation process is specified for the group so far goodwill is concerned of the acquisitioned entity. The excerpts of the annual financial report of Woolworth Holding Limited is featured below for understanding the same;- The basis of goodwill evaluation with impairment is depending upon the factor of evaluation of Cash Generating Unit or CGU or the units to which allocation of goodwill is done. Inventories Inventories are contributing to the current asset which is a basic component of deriving working capital. As David Jones is being taken over by Woolworths Holding Limited in midway of 2014, the inventories of the departmental stores under the possession of the company is also being taken over by the Group. The consolidated financial position of the group had been furnished with segmented portion of different companies running under the group. David Jones had shown the inventories with valuation of 2345 RM in 2016 in comparison to 1864 RM of 2015 with the variance effect of (+) 25%. The steady growth of DJs is being observed with the inventories value increasing, but inherent risk is there to segregate current saleable stock from obsolete stock(Woolworthsholdings, 2016). Receivables Receivable is also considered as the basic component of current asset which is also contributing to the determination of working capital. From the annual financial report of 2016 of the Group it is observed that receivable of DJs is declined from 396 RM of 2015 to 380 RM of 2016 with the negative variance of 4%. Inherent risk is there to segregate good and bad/doubtful debts(Whl, 2016). Cash Handling As the business of DJs is mainly depending upon the counter sale from departmental stores, cash handling plays a vital role in the area of inherent risk detection. Proper internal control is to be practiced to ensure zero level material misstatement in the area of cash handling. ERP implementation with proper software full proof software with control implemented at different layer right from sales to delivery is to be ensured to make the cash handling system perfect. After the acquisition of DJs by the Group, cash and cash equivalent are being observed as increasing with significant growth from 186 RM of 2015 to 324 RM of 2016 with the resultant positive variance of growth by 74%(Woolworthsholdings, 2016). Competition/ Revenue DJs had shown significant increase in their revenue in 2016 with 27% positive growth variance. Revenue of 2016 had shown in the annual financial report of the Group featuring the contribution of DJs as 17297 RM in comparison to 13242 RM of 2015. This growth shows that in spite of stiff competition of the retail chain marketing in Australia, DJs is keeping its growth in satisfactory standard to ensure overcoming the competition. Mainly the competition is confined between DJs and Myer, but DJs, with the backing of its holding company, Woolworths, is sweeping the market with clear growth of 7% and net retail space by 3.5% with value sale increase in AUD terms by 8.4%(Pash, 2016). Liabilities- Current and Non Current Payables, provisions and other non current liabilities are basic component of liabilities along with borrowings. As per the group financial reports of 2016, trade payables, provisions and other non-current liabilities of DJs are 5967 RM with comparison to 4977 RM of 2015 which is with 20% growth variance in 2016 over 2015. Borrowings are 215 RM in 2016 as per Group financial report pertaining to DJs which was new introduction as nothing had been featured under this head in 2015(Whl, 2016). Control Environment As DJs is one component of the group of Woolworths Holding Ltd, the control environment of the company is dictated by the standing procedure of the group which is being fixed by the Audit Committee of the Group consisting of six independent directors. The annual financial report of the Group is also certified by the auditors, Ernst and Young with the declaration of the directors responsibility so far making of financial report as per the fair and true representation of the financial information and the auditors responsibility to opine about the true and fairness presentation of the financial statements of the company(Woolworthsholdings, 2016). It is also conferred in the annual financial report by the auditor that the compliance of effective internal control is to be ensured by the directors of the Group. The Audit Committee is driven by the key result areas in different financial operations out of which assurance of internal control is one of the prime features. This committee is there to ensure the independence of the external auditors, fixation of the charter of internal audit along with planning to confirm the integrated mode of financial reporting as per the objective of assurance model , appointment of the auditors and suggest necessary changes in the financial policies of the group company along with its subsidiaries. All these efforts are to ensure the issues in macro level, while in micro level critical analysis and evaluation is required to make the accounting system of the company full proof. With all these efforts from the Audit Committee, the assurance related to audit with respective financial decisions are enforced to enhance the level of performance of the company so far its operation is concerned. The main objective of control practice is to make it mandatory that inh erent risks are to be detected with the respective steps to mitigate them through proper process manage3ment induced in the company system(Whl, 2016). Conclusion and Recommendations To ensure the detection of inherent risks, I have to be proactive with my knowledge, experience and respective fields of application in David Jones Corporation. As the company is being taken over by world renowned Woolworths Holding Limited, this company is a part of the professionally managed Group which has good infrastructure of financial reporting with the back-up of Audit Committee which can ensure the effective models to be implemented through the system. As the company is engaged in retailing, inherent risk is always there in certain areas like cash handling, and inventory control. As the company is growing after the acquisition, more emphasis is to be given on the areas of control for the components which are directly contributing to the effective working capital practice to make the liquidity ratio of the company in such a position that the company can grow more facing the competition and overcoming it. It is mandatory to go into the deep of the system of the company to find out the inherent risk of the respective organization in respect of auditing. To make it possible I have to understand the system management of the company so far different steps of operation of the company is concerned. The system starts from the level of procurement, supply chain management, sales and marketing and logistics management. In each part of this business, I have to understand the concept of operation and thus it can be ensured that effective detection of inherent risk is possible in different level of activities of the company. Self involvement is necessary to understand the process management and thus the assurance of detecting inherent risk is possible. Although different industries have typical process management which can give birth to inherent audit risks, the probability of material misstatement can be there with intentional or unintentional approaches. It is often observed material misstatement followed by subsequent errors occur due to the nature of the business and the application of the system related to it. The more complicated the system, the bigger the chance of inherent risk is there. Hence to identify and mitigate the respective inherent risk related to any business depends upon the clarity of understanding of operation with clear objectives and respective appropriate strategies implemented in the business. It is the duty of the auditors to find the gaps of the operation system and suggest respective remedies to fulfill them. References: Auasb. (2013, November 11). Auditing Standard ASA 315 Identifying and Assessing the Risks of Material Misstatement through Understanding the Entity and Its Environment. Retrieved January 07, 2017, from Auasb: https://www.auasb.gov.au/admin/file/content102/c3/Nov13_Compiled_Auditing_Standard_ASA_315.pdf Auasb. (2006, April 28). Auditing Standard ASA 315 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement. Retrieved January 07, 2017, from Auasb: https://www.auasb.gov.au/admin/file/content102/c3/ASA_315_28-04-06.pdf Investopedia. (2016, March 06). Inherent Risk. Retrieved January 07, 2017, from Investopedia: https://www.investopedia.com/video/play/inherent-risk/ Nguyen, J. (2009, June). What is the difference between investing and speculating? Retrieved December 07, 2017, from Investopedia: https://www.investopedia.com/ask/answers/09/difference-between-investing-speculating.asp Pash, C. (2016, July 15). David Jones sales growth is crushing the competition. Retrieved January 07, 2017, from Businessinsider: https://www.businessinsider.com.au/david-jones-sales-revenue-smashes-the-competition-2016-7 Whl. (2016). Woolworths Holdings Limited. Retrieved January 07, 2017, from Whl: https://www.woolworthsholdings.co.za/downloads/2016/WHL-Audited-Annual-Financial-Statements-2016.pdf Whl. (2016). Woolworths Holdings Limited. Woolworthsholdings. (2016). Woolworths holdings Limited. Retrieved January 07, 2017, from Woolworthsholdings: https://www.woolworthsholdings.co.za/downloads/2016/WHL-Audited-Annual-Financial-Statements-2016.pdf

Sunday, December 1, 2019

s Wine Indusrty

AMERICA’S WINE INDUSTRY: A GLOBAL SUCCESS J. EDWIN DIETEL After scarcely a generation, the US wine industry is challenging centuries-old European wineries America’s winemakers, most of whom are relative newcomers to the industry, are making superior wines and reaping global acclaim. In a single generation, and at a time when many US industries can no longer claim to be world leaders, the US wine industry’s global success is a fascinating story of entrepreneurial vision and savvy marketing. It remains to be seen whether the American industry has reached its peak, or if new innovations, new competition, and new markets will make the future rosy for US vintners. In terms of worldwide recognition and success, individual American wineries have made their mark only in the last 50-odd years. American experiments with wine-making for the past 200 years- including considerable efforts by Thomas Jefferson to replicate French grape-growing techniques at Monticello- had proved commercially unsuccessful. Not until the end of Prohibition in 1933 did the American wine industry take off on a large scale. America has now become the fourth largest producer in the world behind Italy, France, and Spain. US wine exports in 1999 were up almost threefold over 1990 levels, totaling 74 million gallons ($540 million). Quantity of production is but one measure of success of the industry. American wine producers also have become widely known for the quality of their products. The single event that brought global recognition to the American wine industry occurred in Paris in 1976. There, in a celebrated blind tasting by nine French wine experts, American Chardonnays were compared to their celebrated French counterparts, white Burgundies, while American Cabernet Sauvignons were compared to the prestigious French first-growth red Bordeaux. The American wi... 's Wine Indusrty Free Essays on America\'s Wine Indusrty AMERICA’S WINE INDUSTRY: A GLOBAL SUCCESS J. EDWIN DIETEL After scarcely a generation, the US wine industry is challenging centuries-old European wineries America’s winemakers, most of whom are relative newcomers to the industry, are making superior wines and reaping global acclaim. In a single generation, and at a time when many US industries can no longer claim to be world leaders, the US wine industry’s global success is a fascinating story of entrepreneurial vision and savvy marketing. It remains to be seen whether the American industry has reached its peak, or if new innovations, new competition, and new markets will make the future rosy for US vintners. In terms of worldwide recognition and success, individual American wineries have made their mark only in the last 50-odd years. American experiments with wine-making for the past 200 years- including considerable efforts by Thomas Jefferson to replicate French grape-growing techniques at Monticello- had proved commercially unsuccessful. Not until the end of Prohibition in 1933 did the American wine industry take off on a large scale. America has now become the fourth largest producer in the world behind Italy, France, and Spain. US wine exports in 1999 were up almost threefold over 1990 levels, totaling 74 million gallons ($540 million). Quantity of production is but one measure of success of the industry. American wine producers also have become widely known for the quality of their products. The single event that brought global recognition to the American wine industry occurred in Paris in 1976. There, in a celebrated blind tasting by nine French wine experts, American Chardonnays were compared to their celebrated French counterparts, white Burgundies, while American Cabernet Sauvignons were compared to the prestigious French first-growth red Bordeaux. The American wi...